/etc/yaws/yaws.conf

man page of /etc/yaws/yaws.conf

/etc/yaws/yaws.conf: Configuration file for the yaws web server

NAME

/etc/yaws/yaws.conf - Configuration file for the yaws web server

DESCRIPTION

Yaws is fast lightweight web server. It reads a configuration file
called yaws.conf to control its operations. The configuration contains
two distinct parts a global part which affects all the virtual hosts
and a server part where options for each virtual host is supplied.

GLOBAL PART

logdir = Directory
All yaws logs will be written to files in this directory. There
are several different log files written by yaws.
report.log - this is a text file that contains all error logger
printouts from yaws.
<Host>.access - for each virtual host served by yaws, a file
<Host>.access will be written which contains an access log in
Common Log Format. (See
//en.wikipedia.org/wiki/Common_Log_Format for more details
on Common Log Format.)
<Host>.auth - for each virtual host served by yaws, a file
<Host>.auth will be written which contains all http auth related
messages.
trace.http - this file contains the HTTP trace if that is
enabled
trace.traffic - this file contains the traffic trace if that is
enabled
Note that <Host>.access and <Host>.auth files will be used only
if the directive logger_mod is not set or set to yaws_log.
The default value for logdir is "."
ebin_dir = Directory
This directive adds Directory to the Erlang search path. It is
possible to have several of these command in the configuration
file. The default value is "yaws_dir"/examples/ebin
id = String
It is possible run multiple yaws servers on the same machine. We
use the id of a yaws server to control it using the different
control commands such as:
# /usr/local/bin/yaws --id foobar --stop
To stop the Yaws server with id "foobar". Each Yaws server will
write its internals data into a file called $HOME/.yaws/yaws/ID
where ID the identity of the server. Yaws also creates a file
called ${VARDIR}/run/yaws/ctl-${ID} which contain the port
number where the server is listening for control commands. The
default id is "default".
server_signature = String
This directive set the "Server: " output header to the custom
value. The default value is "yaws/%VSN%, Yet Another Web
Server".
include_dir = Directory
This directive adds Directory to the path of directories where
the Erlang compiler searches for include files. We need to use
this if we want to include .hrl files in our yaws Erlang code.
The default value is "yaws_dir"/examples/include.
max_num_cached_files = Integer
Yaws will cache small files such as commonly accessed GIF images
in RAM. This directive sets a maximum number on the number of
cached files. The default value is 400.
max_num_cached_bytes = Integer
This directive controls the total amount of RAM which can
maximally be used for cached RAM files. The default value is
1000000, 1 megabyte.
max_size_cached_file = Integer
This directive sets a maximum size on the files that are RAM
cached by yaws. The default value i 8000, 8 kBytes.
cache_refresh_secs = Integer
The RAM cache is used to serve pages that sit in the cache. An
entry sits in cache at most cache_refresh_secs number of
seconds. The default is 30. This means that when the content is
updated under the docroot, that change doesn't show until 30
seconds have passed. While developing a yaws site, it may be
convenient to set this value to 0. If the debug flag (-d) is
passed to the yaws start script, this value is automatically set
to 0.
trace = false | traffic | http
This enables traffic or http tracing. Tracing is also possible
to enable with a command line flag to yaws. Default is false.
use_old_ssl = true | false
This re-enables the old OTP ssl implementation. By default we
use the new ssl implementation.
auth_log = true | false
Deprecated and ignored. Now, this target must be set in server
part.
max_connections = nolimit | Integer
Set this value to control the maximum number of connections from
HTTP clients into the server. This is implemented by closing the
last socket if the limit threshold is reached.
keepalive_maxuses = nolimit | Integer
Normally, yaws does not restrict the number of times a
connection is kept alive using keepalive. Setting this parameter
to an integer X will ensure that connections are closed once
they have been used X times. This can be a useful to guard
against long running connections collecting too much garbage in
the Erlang VM.
process_options = "[]" | "[{fullsweep_after, int()} | {min_heap_size,
int()}]"
Override the garbage collection option parameters for processes
that handle new connections. Useful for systems that expect
long-lived connections that handle a lot of data. The default
value is Erlang's default which does minimal garbage collection
until the process dies. The value type is a quoted string which
contains an Erlang property list. See Erlang's
erlang:spawn_opt/4 function for more details.
log_wrap_size = Integer
The logs written by yaws are all wrap logs, the default value at
the size where they wrap around and the original gets renamed to
File.old is 1000000, 1 megabyte. This value can changed.
If we set the value to 0 the logs will never wrap. If we want to
use Yaws in combination with a more traditional log wrapper such
as logrotate, set the size to 0 and Yaws will reopen the
logfiles once they have be renamed/removed.
log_resolve_hostname = true | false
By default the client host IP is not resolved in the access
logs.
fail_on_bind_err = true | false
Fail completely or not if yaws fails to bind a listen socket
Default is true.
enable_soap = true | false
If true, a soap server will be started at startup of Yaws.
Default is false.
soap_srv_mods = ListOfModuleSetting
If enable_soap is true, a startup yaws will invoke
yaws_soap_srv:setup() to setup modules set here. ModuleSetting
is either a triad like <Mod, HandlerFunc, WsdlFile> or a
quadruple form like <Mod, HandlerFunc, WsdlFile, Prefix> which
specifies the prefix. A prefix will be used as argument of
yaws_soap_lib:initModel() and then be used as a XML namespace
prefix. Note, the WsdlFile here should be an absolute-path file
in local file systems.
For example, we can specify
soap_srv_mods=<Mod1, HandlerFunc, WsdlFile1><Mod2,
HandlerFunc, WsdlFile2, SpecifiedPrefix>...
php_exe_path = Path
this target is deprecated and useless. use 'php_handler' target
in server part instead.
The name of (and possibly path to) the php executable used to
interpret php scripts (if allowed). Default is php_exe_path =
php-cgi.
copy_error_log = true | false
Enable or disable copying of the error log. When we run in
embedded mode, there may very well be some other systems process
that is responsible for writing the errorlog to a file whereas
when we run in normal standalone mode, we typically want the
Erlang errorlog written to a report.log file. Default value is
true.
ysession_mod = Module
Allows to specify a different Yaws session storage mechanism
instead of an ETS table. One of the drawbacks of the default
yaws_session_server implementation is that server side cookies
are lost when the server restarts. Specifying a different
module here will pass all writes/read operations to this module
(it must implements appropriate callbacks).
runmod = ModuleName
At startup yaws will invoke ModuleName:start() in a separate
process. It is possible to have several runmods. This is useful
if we want to reuse the yaws startup shell script for our own
application.
pick_first_virthost_on_nomatch = true | false
When Yaws gets a request, it extracts the Host: header from the
client request to choose a virtual server amongst all servers
with the same IP/Port pair. This configuration parameter
decides whether yaws should pick the first (as defined in the
yaws.conf file) if no name match or not. In real live hosting
scenarios we typically want this to be false whereas in
testing/development scenarios it may be convenient to set it to
true. Default is true.
keepalive_timeout = TimeInMilliseconds | infinity
If the HTTP session will be kept alive (i.e., not immediately
closed) it will close after keepalive_timeout milliseconds
unless a new request is received in that time. The default value
is 30000. The value infinity is legal but not recommended.
subconfig = File
Load specified config file.
subconfigdir = Directory
Load all config file in specified directory.
x_forwarded_for_log_proxy_whitelist = ListOfUpstreamProxyServerIps
In case yaws is running behind a HTTP proxy or HTTP load
balancer it may be desirable to configure this proxy to put the
IP address of the originating client into the X-Forwarded-For
header and have yaws log this IP address as the request's source
IP address instead of logging the proxy server's IP address over
and over again. This setting determines which source IP
addresses are rewritten in this manner.
For example, if there are two proxies with the IP addresses
192.168.0.1 and 192.168.0.2 in front of yaws, we can specify:
x_forwarded_for_log_proxy_whitelist = 192.168.0.1 192.168.0.2

SERVER PART

Yaws can virthost several web servers on the same IP address as well as
several web servers on different IP addresses. This includes SSL
servers.
Each virtual host is defined within a matching pair of <server
ServerName> and </server>. The ServerName will be the name of the
webserver.
The following directives are allowed inside a server definition.
port = Port
This makes the server listen on Port. Default is 8000.
listen = IpAddress
This makes the server listen on IpAddress. When virthosting
several servers on the same ip/port address, if the browser
doesn't send a Host: field, yaws will pick the first server
specified in the config file. If the specified IP address is
0.0.0.0 yaws will listen on all local IP addresses on the
specified port. Default is 0.0.0.0. Multiple listen directives
may be used to specify several addresses to listen on.
listen_backlog = Integer
This sets the TCP listen backlog for the server to define the
maximum length the queue of pending connections may grow to. The
default is the same as the default provided by gen_tcp:listen/2,
which is 5.
rhost = Host[:Port]
This forces all local redirects issued by the server to go to
Host. This is useful when yaws listens to a port which is
different from the port that the user connects to. For example,
running yaws as a non-privileged user makes it impossible to
listen to port 80, since that port can only be opened by a
privileged user. Instead yaws listens to a high port number
port, 8000, and iptables are used to redirect traffic to port 80
to port 8000 (most NAT:ing firewalls will also do this for you).
rscheme = http | https
This forces all local redirects issued by the server to use this
method. This is useful when an SSL off-loader, or stunnel, is
used in front of yaws.
auth_log = true | false
Enable or disable the auth log for this virtual server. Default
is true.
access_log = true | false
Setting this directive to false turns of traffic logging for
this virtual server. The default value is true.
logger_mod = Module
It is possible to set a special module that handles access and
auth logging. The default is to log all web server traffic to
<Host>.access and <Host>.auth files in the configured or default
logdir.
This module must implement the behaviour yaws_logger. Default
value is yaws_log.
The following functions should be exported:
Module:open_log(ServerName, Type, LogDir)
When yaws is started, this function is called for this
virtual server. If the initialization is successful, the
function must return {true,State} and if an error occurred,
it must return false.
Module:close_log(ServerName, Type)
This function is called for this virtual server when yaws
is stopped.
Module:wrap_log(ServerName, Type, State, LogWrapSize)
This function is used to rotate log files. It is regularly
called by yaws and must return the possibly updated
internal NewState.
Module:write_log(ServerName, Type, State, Infos)
When it needs to log a message, Yaws will call this
function. The parameter Infos is
{Ip,Req,InHdrs,OutHdrs,Time} for an access log and
{Ip,Path,Item} for an auth log, where:
Ip - IP address of the accessing client (as a tuple).
Req - the HTTP method, URI path, and HTTP version of the
request (as a #http_request{} record).
InHdrs - the HTTP headers which were sent from the WWW
client (as a #headers{} record).
OutHdrs - the HTTP headers sent to the WWW client (as a
#outh{} record)
Path - the URI path of the request (as a string).
Item - the result of an authentication request. May be
{ok,User}, 403 or {401,Realm}.
Time - The time taken to serve the request, in
microseconds.
For all of these callbacks, ServerName is the virtual server's
name, Type is the atom access or auth and State is the internal
state of the logger.
shaper = Module
Defines a module to control access to this virtual server.
Access can be controlled based on the IP address of the client.
It is also possible to throttles HTTP requests based on the
client's download rate. This module must implement the behaviour
yaws_shaper.
There is no such module configured by default.
dir_listings = true | true_nozip | false
Setting this directive to false disallows the automatic dir
listing feature of Yaws. A status code 403 Forbidden will be
sent. Set to true_nozip to avoid the auto-generated all.zip
entries. Default is false.
extra_cgi_vars = .....
Add additional CGI or FastCGI variables. For example:
<extra_cgi_vars dir='/path/to/some/scripts'>
var = val
...
</extra_cgi_vars>
statistics = true | false
Turns on/off statistics gathering for a virtual server. Default
is false.
fcgi_app_server = Host:Port
The hostname and TCP port number of a FastCGI application
server. The TCP port number is not optional. There is no
default value.
fcgi_trace_protocol = true | false
Enable or disable tracing of FastCGI protocol messages as info
log messages. Disabled by default.
fcgi_log_app_error = true | false
Enable or disable logging of application error messages (output
to stderr and non-zero exit value). Disabled by default.
deflate = true | false
Turns on or off deflate compression for a server. Default is
false.
docroot = Directory ...
This makes the server serve all its content from Directory.
It is possible to pass a space-separated list of directories as
docroot. If this is the case, the various directories will be
searched in order for the requested file. This also works with
the ssi and yssi constructs where the full list of directories
will be searched for files to ssi/yssi include.
auth_skip_docroot = true | false
If true, the docroot will not be searched for .yaws_auth files.
This is useful when the docroot is quite large and the time to
search it is prohibitive when yaws starts up. Defaults to false.
partial_post_size = Integer | nolimit
When a yaws file receives large POSTs, the amount of data
received in each chunk is determined by the this parameter. The
default value is 10240.
dav = true | false
Turns on the DAV protocol for this server. The dav support in
yaws is highly limited. If dav is turned on, .yaws processing of
.yaws pages is turned off. Default is false. Setting it to
nolimit is potentially dangerous. The socket read timeout is
supplied by the keepalive_timeout setting. If the read is not
done within the timeout, the POST will fail.
tilde_expand = true|false
If this value is set to false yaws will never do tilde
expansion. The default is false. tilde_expansion is the
mechanism whereby a URL on the form //www.foo.com/~username
is changed into a request where the docroot for that particular
request is set to the directory ~username/public_html/ Default
is false.
allowed_scripts = ListOfSuffixes
The allowed script types for this server. Recognized are
'yaws', 'cgi', 'fcgi', 'php'. Default is allowed_scripts = yaws
php cgi fcgi.
Note: for fcgi scripts, the FastCGI application server is only
called if a local file with the .fcgi extension exists. However,
the contents of the local .fcgi file are ignored.
tilde_allowed_scripts = ListOfSuffixes
The allowed script types for this server when executing files in
a users public_html folder Recognized are 'yaws', 'cgi',
'fcgi', 'php'. Default is tilde_allowed_scripts = i.e. empty
appmods = ListOfModuleNames
If any the names in ListOfModuleNames appear as components in
the path for a request, the path request parsing will terminate
and that module will be called. There is also an alternate
syntax for specifying the appmods if we don't want our internal
erlang module names to be exposed in the URL paths. We can
specify
appmods = <Path1, Module1> <Path2, Modules2> ...
Assume for example that we have the URL
//www.hyber.org/myapp/foo/bar/baz?user=joe while we have
the module foo defined as an appmod, the function foo:out(Arg)
will be invoked instead of searching the filesystems below the
point foo.
The Arg argument will have the missing path part supplied in its
appmoddata field.
It is also possible to exclude certain directories from appmod
processing. This is particulaly interesting for '/' appmods.
Here is an example:
appmods = </, myapp exclude_paths icons js top/static>
The above configuration will invoke the 'myapp' erlang module on
everything except any file found in directories, 'icons', 'js'
and 'top/static' relative to the docroot.
errormod_404 = Module
It is possible to set a special module that handles 404 Not
Found messages.
The function Module:out404(Arg, GC, SC) will be invoked. The
arguments are
Arg is a #arg{} record
GC is a #gconf{} record (defined in yaws.hrl)
SC is a #sconf{} record (defined in yaws.hrl)
The function can and must do the same things that a normal out/1
does.
errormod_401 = Module
It is possible to set a special module that handles 401
Unauthorized messages. This can for example be used to display a
login page instead.
The function Module:out401(Arg, Auth, Realm) will be invoked.
The arguments are
Arg is a #arg{} record
Auth is a #auth{} record
Realm is a string
The function can and must do the same things that a normal out/1
does.
errormod_crash = Module
It is possible to set a special module that handles the HTML
generation of server crash messages. The default is to display
the entire formated crash message in the browser. This is good
for debugging but not in production.
The function Module:crashmsg(Arg, SC, Str) will be called. The
Str is the real crash message formated as a string.
The function must return, {content,MimeType,Cont} or {html, Str}
or {ehtml, Term}. That data will be shipped to the client.
expires = ListOfExpires
Controls the setting of the Expires HTTP header and the max-age
directive of the Cache-Control HTTP header in server responses
for specific mime types. The expiration date can set to be
relative to either the time the source file was last modified,
or to the time of the client access. ListOfExpires is defined as
follows:
expires = <MimeType1, access+Seconds> <MimeType2,
modify+Seconds> ...
These HTTP headers are an instruction to the client about the
document's validity and persistence. If cached, the document may
be fetched from the cache rather than from the source until this
time has passed. After that, the cache copy is considered
"expired" and invalid, and a new copy must be obtained from the
source. Here is an example:
expires = <image/gif, access+2592000> <image/png,
access+2592000>
expires = <image/jpeg, access+2592000> <text/css,
access+2592000>
arg_rewrite_mod = Module
It is possible to install a module that rewrites all the Arg
#arg{} records at an early stage in the yaws server. This can
be used to do various things such as checking a cookie,
rewriting paths etc.
The module yaws_vdir can be used in case you want to serve
static content that is not located in your docroot. See the
example at the bottom of this man page for how to use the opaque
+ vdir elements to instruct the yaws_vdir module what paths to
rewrite.
start_mod = Module
Defines a user provided callback module. At startup of the
server, Module:start/1 will be called. The #sconf{} record
(defined in yaws.hrl) will be used as the input argument. This
makes it possible for a user application to synchronize the
startup with the yaws server as well as getting hold of user
specific configuration data, see the explanation for the
<opaque> context.
revproxy = Prefix Url
Make yaws a reverse proxy. The Prefix is a path inside our own
docroot and the Url argument is an url pointing to a website we
want to "mount" under the path which is Prefix.
Example: revproxy = /tmp/foo //yaws.hyber.org
Makes the hyber website appear under /tmp/foo
It is possible to have multiple reverse proxies inside the same
server.
WARNING, this feature is yet not in production quality.
fwdproxy = true|false
Make yaws a forward proxy. By enabling this option you can use
yaws as a proxy for outgoing web traffic, typically by
configuring the proxy settings in a web-browser to explicitly
target yaws as its proxy server.
WARNING, this feature is yet not in production quality.
servername = Name
If we're virthosting everal servers and want to force a server
to match specific Host: headers we can do this with the
"servername" directive. This name doesn't necessarily have to be
the same as the the name inside <server Name> in certain NAT
scenarios. Rarely used feature.
php_handler = <Type, Spec>
Set handler to interpret .php files. It can be one of the
following definitions:
php_handler = <cgi, Filename> - The name of (and possibly path
to) the php executable used to interpret php scripts (if
allowed).
php_handler = <fcgi, Host:Port> - Use the specified fastcgi
server to interpret .php files (if allowed).
Yaws does not start the PHP interpreter in fastcgi mode for
you. To run PHP in fastcgi mode, call it with the -b
option. For example:
php5-cgi -b '127.0.0.1:54321'
This starts a php5 in fastcgi mode listening on the local
network interface. To make use of this PHP server from
yaws, specify:
php_handler = <fcgi, 127.0.0.1:54321>
The PHP interpreter needs read access to the files it is to
serve. Thus, if you run it in a different security context
than yaws itself, make sure it has access to the .php
files.
Please note that anyone who is able to connect to the php
fastcgi server directly can use it to read any file to
which it has read access. You should consider this when
setting up a system with several mutually untrusted
instances of php.
php_handler = <extern, Module:Function | Node:Module:Function> -
Use an external handler, possibly on another node, to interpret
.php files (if allowed).
To interpret a .php file, the function Module:Function(Arg)
will be invoked (Evaluated inside a rpc call if a Node is
specified), where Arg is a #arg{} record.
The function must do the same things that a normal out/1
does.
Default value is <cgi, "/usr/bin/php-cgi">.
phpfcgi = Host:Port
this target is deprecated. use 'php_handler' target in server
part instead.
Use this directive is same as: php_handler = <fcgi, Host:Port>.
<ssl> .... </ssl>
This begins and ends an SSL configuration for this server. It's
possible to virthost several SSL servers on the same IP given
that they all share the same certificate configuration. In
general it is complicated to virthost several SSL servers on the
same IP address since the certificate is typically bound to a
domainname in the common name part of the certificate. One
solution (the only?) to this problem is to have a certificate
with multiple subjectAltNames. See
//wiki.cacert.org/VhostTaskForce#Interoperability_Test
keyfile = File
Specifies which file contains the private key for the
certificate. If not specified then the certificate file will be
used.
certfile = File
Specifies which file contains the certificate for the server.
cacertfile = File
A file containing trusted certificates to use during client
authentication and to use when attempting to build the server
certificate chain. The list is also used in the list of
acceptable client CAs passed to the client when a certificate is
requested.
verify = 0 | 1 | 2 | verify_none | verify_peer
Specifies the level of verification the server does on client
certs. 0 means that the server will not ask for a cert
(verify_none), 1 means that the server will ask the client for a
cert but not fail if the client does not supply a client cert
(verify_peer, fail_if_no_peer_cert = false), 2 means that the
server requires the client to supply a client cert (verify_peer,
fail_if_no_peer_cert = true).
Setting verify_none means that the x509 validation will be
skipped (no certificate request is sent to the client),
verify_peer means that a certificate request is sent to the
client (x509 validation is performed.
You might want to use fail_if_no_peer_cert in combination with
verify_peer.
fail_if_no_peer_cert = true | false
If verify is set to verify_peer and set to true the connection
will fail if the client does not send a certificate (i.e. an
empty certificate). If set to false the server will fail only if
an invalid certificate is supplied (an empty certificate is
considered valid).
depth = Int
Specifies the depth of certificate chains the server is prepared
to follow when verifying client certs. For the OTP new ssl
implementation it is also used to specify how far the server,
i.e. we, shall follow the SSL certificates we present to the
clients. Hence, using self signed certs, we typically need to
set this to 0.
password = String
String If the private key is encrypted on disc, this password is
the 3Dee key to decrypt it.
ciphers = String
This string specifies the SSL cipher string. The syntax of the
SSL cipher string is a little horrible sublanguage of its own.
It is documented in the ssl man page for "ciphers".
</ssl> Ends an SSL definition
<redirect> ... </redirect>
Defines a redirect mapping. The following items are allowed
within a matching pair of <redirect> and </redirect> delimiters.
We can have a series of
Path = URL or
Path = file
All accesses to Path will be redirected to URL/Path or
alternatively to scheme:host:port/file/Path if a file is used.
Note that the original path is appended to the redirected url.
So if we for example have:
<redirect>
/foo = //www.mysite.org/zapp
/bar = /tomato.html
</redirect>
Asumming this config resides on a site called //abc.com, We
have the following redirects:
//abc.com/foo -> //www.mysite.org/zapp/foo
//abc.com/foo/test -> //www.mysite.org/zapp/foo/test
//abc.com/bar -> //abc.com/bar
//abc.com/bar/x/y/z -> //abc.com/bar/x/y/z
Sometimes we do not want to have the original path appended to
the redirected path. To get that behaviour we specify the config
with '==' instead of '='.
<redirect>
/foo == //www.mysite.org/zapp
/bar = /tomato.html </redirect>
Now a request for //abc.com/foo/x/y/z simply gets
redirected to //www.mysite.org/zapp. This is typically used
when we simply want a static redirect at some place in the
docroot.
When we specify a file as target for the redirect, the redir
will be to the current http(s) server.
<auth> ... </auth>
Defines an auth structure. The following items are allowed
within a matching pair of <auth> and </auth> delimiters.
docroot = Docroot
If a docroot is defined, this auth structure will be tested only
for requests in the specified docroot. No docroot configured
means all docroots. If two auth structures are defined, one
with a docroot and one with no docroot, the first of both
overrides the second one for requests in the configured docroot.
dir = Dir
Makes Dir to be controlled by WWW-authenticate headers. In order
for a user to have access to WWW-Authenticate controlled
directory, the user must supply a password. The Dir must be
specified relative to the docroot. Multiple dir can be used. If
no dir is set, the default value, "/", will be used.
realm = Realm
In the directory defined here, the WWW-Authenticate Realm is set
to this value.
authmod = AuthMod
If an auth module is defined then AuthMod:auth(Arg, Auth) will
be called for all access to the directory. The auth/2 function
should return one of: true, false, {false, Realm}, {appmod,
Mod}. If {appmod, Mod} is returned then a call to
Mod:out401(Arg, Auth, Realm) will be used to deliver the
content. If errormod_401 is defined, the call to Mod will be
ignored. (Mod:out(Arg) is deprecated).
This can, for example, be used to implement cookie
authentication. The auth() callback would check if a valid
cookie header is present, if not it would return {appmod,
?MODULE} and the out401/1 function in the same module would
return {redirect_local, "/login.html"}.
user = User:Password
Inside this directory, the user User has access if the user
supplies the password Password in the popup dialogue presented
by the browser. We can obviously have several of these value
inside a single <auth> </auth> pair.
The usage of User:Password in the actual config file is
deprecated as of release 1.51. It is preferred to have the users
in a file called .yaws_auth in the actual directory. The
.yaws_auth file has to be file parseable by file:consult/1
Each row of the file must contain terms on the form
{User, Password}.
Where both User and Password should be strings. The .yaws_auth
file mechanism is recursive. Thus any subdirectories to Dir are
automatically also protected.
The .yaws_auth file is never visible in a dir listing
pam service = pam-service
If the item pam is part of the auth structure, Yaws will also
try to authenticate the user using "pam" using the pam service
indicated. Usual services are typically found under /etc/pam.d.
Usual values are "system-auth" etc.
pam authentication is performed by an Erlang port program which
is typically installed as suid root by the yaws install script.
allow = all | ListOfHost
The allow directive affects which hosts can access an area of
the server. Access can be controlled by IP address or IP address
range. If all is specified, then all hosts are allowed access,
subject to the configuration of the deny and order directives.
To allow only particular hosts or groups of hosts to access the
server, the host can be specified in any of the following
formats:
A full IP address
allow = 10.1.2.3
allow = 192.168.1.104, 192.168.1.205
A network/netmask pair
allow = 10.1.0.0/255.255.0.0
A network/nnn CIDR specification
allow = 10.1.0.0/16
deny = all | ListOfHost
This directive allows access to the server to be restricted
based on IP address. The arguments for the deny directive are
identical to the arguments for the allow directive.
order = Ordering
The order directive, along with allow and deny directives,
controls a three-pass access control system. The first pass
processes either all allow or all deny directives, as specified
by the order directive. The second pass parses the rest of the
directives (deny or allow). The third pass applies to all
requests which do not match either of the first two.
Ordering is one of (Default value is deny,allow):
allow,deny
First, allallow directives are evaluated; at least one must
match, or the request is rejected. Next, deny directives
are evaluated. If any matches, the request is rejected.
Last, any requests which do not match an allow or a deny
directive are denied by default.
deny,allow
First, all deny directives are evaluated; if any match, the
request is denied unless it also matches an allow
directive. Any requests which do not match any allow or
deny directives are permitted.
</auth>
Ends an auth definition
<opaque> .... </opaque>
This begins and ends an opaque configuration context for this
server, where 'Key = Value' directives can be specified. These
directives are ignored by yaws (hence the name opaque), but can
be accessed as a list of tuples {Key,Value} stored in the
#sconf.opaque record entry. See also the description of the
start_mod directive.
This mechanism can be used to pass data from a surrounding
application into the individual .yaws pages.